Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date ERP Security 101: Things Every Organization Should Be Doing to Secure ERP Beth Barach Director, Onapsis Product Marketing Traditional cybersecurity investments have focused on defending the perimeter with little attention paid to the application layer. More importantly, t... 2 months ago | 17 mins The Future of Data Protection Using Cloud Object Storage Henry Baltazar, 451 Research; Drew Schlussel, Wasabi Technologies; Rick W. Vanover, Veeam While the on-prem versus cloud debate still rages on, the majority of enterprises have moved ahead with a hybrid cloud strategy, leveraging best-of-br... 2 months ago | 58 mins Initiating and Maintaining an Elevated Security Posture with SOAR Tools and XDR Neelima Rustagi, Bruce Hembree, Christopher Kissel Watch the Expert Discussion. Right now, the expectations for cybersecurity vendors are unusually high – especially for security orchestration, automa... 4 months ago | 51 mins The Elevated Cybersecurity Risks due to Geopolitical Unrest Cricket Liu, Chief DNS Architect and Srikrupa Srivatsan, Director, Product Marketing The last several years have brought on unprecedented world events, including the COVID-19 pandemic and now the Russian invasion of Ukraine. These even... 7 months ago | 61 mins Five SOC Modernisation Stories: How Splunk customers have elevated their SOC Kirsty Paine, Ana Arruda, Le-Khanh Au, Lars Wittich, Drew Gibson, and Matthias Maier On average, organisations have more than 30 security solutions in place and continue to evaluate, acquire and implement more. Each solution produces a... 7 months ago | 57 mins THREAT INTELLIGENCE MANAGEMENT, ELEVATED: A webinar with Kevin Mitnick Kevin Mitnick, Mitnick Security | Joseph Blankenship, Forrester | Ryan Clough, Palo Alto | Shravanthi Reddy, Palo Alto Join us for a look at the future, featuring Kevin Mitnick and Forrester’s Joseph Blankenship, and the launch of Threat Intelligence Management 3.0 Ke... 8 months ago | 81 mins Modern Application Security Trends Bruce Schneier, Randy Birdsall, Martin Lee Today’s complex application delivery ecosystems are leaving technologists more challenged than ever to implement application threat detection and prev... February 21, 2023 5:00pm Russia-Ukraine Conflict: Impact on Cyber Threats to US Healthcare John Riggi, Sr. Advisor for Cybersecurity & Risk AHA. Carolyn Crandall, Chief Security Advocate, Attivo Networks. The outbreak of European conflict over the past week brings with it an unprecedented level of concern for pending cyber-attacks. In light of previous... 11 months ago | 30 mins Rain, Hail, or Insider threat? A Risk-Based Approach to Cloud Threats Oliver Rochford | Kayzad Vanskuiwalla According to Verizon's Data Breach Investigations Report, 24% of breaches involve cloud assets. Many of the benefits that cloud services deliver to or... 1 year ago | 46 mins Insights for CISOs: Endpoint Security Sarah Pavlak, Frost & Sullivan, Ben Jones, Traced, Jony Fischbein, Check Point, Harri Ruusinen, WithSecure The need for endpoint security has exploded over the past few years. This is largely a result of evolving remote working environments, as well as the ... 4 months ago | 27 mins Load more